GOPHERSET: Controls phone remotely via SIM card. | HOWLERMONKEY: A radio transceiver for exploiting systems. | VAGRANT: Collection of Computer Screens. | MINERALIZE: Collection from LAN Implant. | MAGNETIC: Sensor Collection of Magnetic Emanations. |
PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000. | DROPMIRE: Passive collection using antenna. | GENIE: Multi-stage operation: jumping the airgap etc. | ECHELON: Interception and content inspection of communications. | IRONCHEF: BIOS malware that communicates with RF implants. |
FOXACID: Installing spyware with at the packet level. | LOUDAUTO: Audio-based RF retro-reflector listening device. | NSA CAPABILITIES BINGO (free square) | CTX4000: Radar device for recovery of "off net" information. | HALLUXWATER: Exploit for Huawei Eudemon firewalls. |
STELLARWIND: Data mining the communications of American citizens. | MONTANA: Tools to compromise Juniper Networks routers. | BLACKHEART: Collection from an FBI Implant. | PRISM: Mass electronic surveillance & data mining. | GINSU: PCI bus device that can inject malware at boot-up. |
FIREWALK: Fake RJ45 socket that allows monitoring via RF. | DEWSWEEPER: USB wireless Bridge into target network. | NIGHTSTAND: Wirelessly installs exploits of Windows. | FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | CANDYGRAM: Mimics a cellphone tower. |